Hardcover. Zustand: Fine. 144197721X Fine/As New; Hardcover; Covers are still glossy with "sharp" edge-corners; Unblemished textblock edges; The endpapers and all text pages are bright and unmarked; Binding is tight with a straight spine; This book will be stored and delivered in a sturdy cardboard box with foam padding; Medium Format (8.5" - 9.75" tall); Blue and yellow covers with title in white lettering; 2013, Springer-Verlag Publishing; 207 pages; "Quantum Attacks on Public-Key Cryptosystems," by Song Y. Yan.
EUR 103,05
Anzahl: Mehr als 20 verfügbar
In den WarenkorbZustand: New.
EUR 104,58
Anzahl: Mehr als 20 verfügbar
In den WarenkorbZustand: New.
EUR 103,39
Anzahl: Mehr als 20 verfügbar
In den WarenkorbZustand: New.
Anbieter: Ria Christie Collections, Uxbridge, Vereinigtes Königreich
EUR 110,61
Anzahl: Mehr als 20 verfügbar
In den WarenkorbZustand: New. In.
Anbieter: Ria Christie Collections, Uxbridge, Vereinigtes Königreich
EUR 110,61
Anzahl: Mehr als 20 verfügbar
In den WarenkorbZustand: New. In.
Anbieter: GreatBookPricesUK, Woodford Green, Vereinigtes Königreich
EUR 110,59
Anzahl: Mehr als 20 verfügbar
In den WarenkorbZustand: New.
Zustand: New. pp. 207.
Verlag: Springer-Verlag New York Inc, 2013
ISBN 10: 144197721X ISBN 13: 9781441977212
Sprache: Englisch
Anbieter: Revaluation Books, Exeter, Vereinigtes Königreich
EUR 153,06
Anzahl: 2 verfügbar
In den WarenkorbHardcover. Zustand: Brand New. 207 pages. 9.25x6.25x0.55 inches. In Stock.
Verlag: Springer US, Springer US Apr 2013, 2013
ISBN 10: 144197721X ISBN 13: 9781441977212
Sprache: Englisch
Anbieter: buchversandmimpf2000, Emtmannsberg, BAYE, Deutschland
Buch. Zustand: Neu. Neuware -The cryptosystems based on the Integer Factorization Problem (IFP), the Discrete Logarithm Problem (DLP) and the Elliptic Curve Discrete Logarithm Problem (ECDLP) are essentially the only three types of practical public-key cryptosystems in use. The security of these cryptosystems relies heavily on these three infeasible problems, as no polynomial-time algorithms exist for them so far. However, polynomial-time quantum algorithms for IFP, DLP and ECDLP do exist, provided that a practical quantum computer exists.Quantum Attacks on Public-Key Cryptosystems presemts almost allknown quantum computing based attacks on public-key cryptosystems, with an emphasis on quantum algorithms for IFP, DLP, and ECDLP. It also discusses some quantum resistant cryptosystems to replace the IFP, DLP and ECDLP based cryptosystems.This book is intended to be used either as a graduate text in computing, communications and mathematics, or as a basic reference in the field.Springer Verlag GmbH, Tiergartenstr. 17, 69121 Heidelberg 216 pp. Englisch.
Taschenbuch. Zustand: Neu. Druck auf Anfrage Neuware - Printed after ordering - The cryptosystems based on the Integer Factorization Problem (IFP), the Discrete Logarithm Problem (DLP) and the Elliptic Curve Discrete Logarithm Problem (ECDLP) are essentially the only three types of practical public-key cryptosystems in use. The security of these cryptosystems relies heavily on these three infeasible problems, as no polynomial-time algorithms exist for them so far. However, polynomial-time quantum algorithms for IFP, DLP and ECDLP do exist, provided that a practical quantum computer exists.Quantum Attacks on Public-Key Cryptosystems presemts almost all known quantum computing based attacks on public-key cryptosystems, with an emphasis on quantum algorithms for IFP, DLP, and ECDLP. It also discusses some quantum resistant cryptosystems to replace the IFP, DLP and ECDLP based cryptosystems.This book is intended to be used either as a graduate text in computing, communications and mathematics, or as a basic reference in the field.
Buch. Zustand: Neu. Druck auf Anfrage Neuware - Printed after ordering - The cryptosystems based on the Integer Factorization Problem (IFP), the Discrete Logarithm Problem (DLP) and the Elliptic Curve Discrete Logarithm Problem (ECDLP) are essentially the only three types of practical public-key cryptosystems in use. The security of these cryptosystems relies heavily on these three infeasible problems, as no polynomial-time algorithms exist for them so far. However, polynomial-time quantum algorithms for IFP, DLP and ECDLP do exist, provided that a practical quantum computer exists.Quantum Attacks on Public-Key Cryptosystems presemts almost all known quantum computing based attacks on public-key cryptosystems, with an emphasis on quantum algorithms for IFP, DLP, and ECDLP. It also discusses some quantum resistant cryptosystems to replace the IFP, DLP and ECDLP based cryptosystems.This book is intended to be used either as a graduate text in computing, communications and mathematics, or as a basic reference in the field.
Anbieter: GreatBookPricesUK, Woodford Green, Vereinigtes Königreich
EUR 170,38
Anzahl: Mehr als 20 verfügbar
In den WarenkorbZustand: As New. Unread book in perfect condition.
Anbieter: Mispah books, Redhill, SURRE, Vereinigtes Königreich
EUR 160,99
Anzahl: 1 verfügbar
In den WarenkorbHardcover. Zustand: Like New. Like New. book.
EUR 192,85
Anzahl: Mehr als 20 verfügbar
In den WarenkorbZustand: As New. Unread book in perfect condition.
Anbieter: Mispah books, Redhill, SURRE, Vereinigtes Königreich
EUR 176,26
Anzahl: 1 verfügbar
In den WarenkorbPaperback. Zustand: Like New. Like New. book.
Anbieter: Brook Bookstore On Demand, Napoli, NA, Italien
EUR 86,24
Anzahl: Mehr als 20 verfügbar
In den WarenkorbZustand: new. Questo è un articolo print on demand.
Anbieter: BuchWeltWeit Ludwig Meier e.K., Bergisch Gladbach, Deutschland
Taschenbuch. Zustand: Neu. This item is printed on demand - it takes 3-4 days longer - Neuware -The cryptosystems based on the Integer Factorization Problem (IFP), the Discrete Logarithm Problem (DLP) and the Elliptic Curve Discrete Logarithm Problem (ECDLP) are essentially the only three types of practical public-key cryptosystems in use. The security of these cryptosystems relies heavily on these three infeasible problems, as no polynomial-time algorithms exist for them so far. However, polynomial-time quantum algorithms for IFP, DLP and ECDLP do exist, provided that a practical quantum computer exists.Quantum Attacks on Public-Key Cryptosystems presemts almost all known quantum computing based attacks on public-key cryptosystems, with an emphasis on quantum algorithms for IFP, DLP, and ECDLP. It also discusses some quantum resistant cryptosystems to replace the IFP, DLP and ECDLP based cryptosystems.This book is intended to be used either as a graduate text in computing, communications and mathematics, or as a basic reference in the field. 216 pp. Englisch.
Anbieter: BuchWeltWeit Ludwig Meier e.K., Bergisch Gladbach, Deutschland
Buch. Zustand: Neu. This item is printed on demand - it takes 3-4 days longer - Neuware -The cryptosystems based on the Integer Factorization Problem (IFP), the Discrete Logarithm Problem (DLP) and the Elliptic Curve Discrete Logarithm Problem (ECDLP) are essentially the only three types of practical public-key cryptosystems in use. The security of these cryptosystems relies heavily on these three infeasible problems, as no polynomial-time algorithms exist for them so far. However, polynomial-time quantum algorithms for IFP, DLP and ECDLP do exist, provided that a practical quantum computer exists.Quantum Attacks on Public-Key Cryptosystems presemts almost all known quantum computing based attacks on public-key cryptosystems, with an emphasis on quantum algorithms for IFP, DLP, and ECDLP. It also discusses some quantum resistant cryptosystems to replace the IFP, DLP and ECDLP based cryptosystems.This book is intended to be used either as a graduate text in computing, communications and mathematics, or as a basic reference in the field. 216 pp. Englisch.
Anbieter: moluna, Greven, Deutschland
EUR 92,27
Anzahl: Mehr als 20 verfügbar
In den WarenkorbZustand: New. Dieser Artikel ist ein Print on Demand Artikel und wird nach Ihrer Bestellung fuer Sie gedruckt. Discusses almost all known quantum attacks on IFP, DLP and ECDLP based public-key cryptosystemsCovers many alternative post-quantum cryptosystems to replace the classic IFP, DLP and ECDLP based cryptosystemsCryptographers and professionals .
Anbieter: moluna, Greven, Deutschland
EUR 92,27
Anzahl: Mehr als 20 verfügbar
In den WarenkorbGebunden. Zustand: New. Dieser Artikel ist ein Print on Demand Artikel und wird nach Ihrer Bestellung fuer Sie gedruckt. Discusses almost all known quantum attacks on IFP, DLP and ECDLP based public-key cryptosystemsCovers many alternative post-quantum cryptosystems to replace the classic IFP, DLP and ECDLP based cryptosystemsCryptographers and professionals .
Verlag: Springer-Verlag New York Inc., 2013
ISBN 10: 144197721X ISBN 13: 9781441977212
Sprache: Englisch
Anbieter: THE SAINT BOOKSTORE, Southport, Vereinigtes Königreich
EUR 134,75
Anzahl: Mehr als 20 verfügbar
In den WarenkorbHardback. Zustand: New. This item is printed on demand. New copy - Usually dispatched within 5-9 working days 506.
Anbieter: Majestic Books, Hounslow, Vereinigtes Königreich
EUR 148,90
Anzahl: 4 verfügbar
In den WarenkorbZustand: New. Print on Demand pp. 207.
Anbieter: Biblios, Frankfurt am main, HESSE, Deutschland
Zustand: New. PRINT ON DEMAND pp. 207.
Verlag: Springer US, Springer US Mai 2015, 2015
ISBN 10: 1489997792 ISBN 13: 9781489997791
Sprache: Englisch
Anbieter: buchversandmimpf2000, Emtmannsberg, BAYE, Deutschland
Taschenbuch. Zustand: Neu. This item is printed on demand - Print on Demand Titel. Neuware -The cryptosystems based on the Integer Factorization Problem (IFP), the Discrete Logarithm Problem (DLP) and the Elliptic Curve Discrete Logarithm Problem (ECDLP) are essentially the only three types of practical public-key cryptosystems in use. The security of these cryptosystems relies heavily on these three infeasible problems, as no polynomial-time algorithms exist for them so far. However, polynomial-time quantum algorithms for IFP, DLP and ECDLP do exist, provided that a practical quantum computer exists.Quantum Attacks on Public-Key Cryptosystems presemts almost allknown quantum computing based attacks on public-key cryptosystems, with an emphasis on quantum algorithms for IFP, DLP, and ECDLP. It also discusses some quantum resistant cryptosystems to replace the IFP, DLP and ECDLP based cryptosystems.This book is intended to be used either as a graduate text in computing, communications and mathematics, or as a basic reference in the field.Springer Verlag GmbH, Tiergartenstr. 17, 69121 Heidelberg 216 pp. Englisch.